US9558076B2 - Methods and systems of cloud-based disaster recovery - Google Patents
Methods and systems of cloud-based disaster recovery Download PDFInfo
- Publication number
- US9558076B2 US9558076B2 US14/280,686 US201414280686A US9558076B2 US 9558076 B2 US9558076 B2 US 9558076B2 US 201414280686 A US201414280686 A US 201414280686A US 9558076 B2 US9558076 B2 US 9558076B2
- Authority
- US
- United States
- Prior art keywords
- application
- cloud
- data
- appliance
- metadata
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active - Reinstated, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000011084 recovery Methods 0.000 title description 10
- 230000008878 coupling Effects 0.000 claims abstract description 4
- 238000010168 coupling process Methods 0.000 claims abstract description 4
- 238000005859 coupling reaction Methods 0.000 claims abstract description 4
- 238000004422 calculation algorithm Methods 0.000 claims description 10
- 230000006870 function Effects 0.000 claims description 7
- 230000002194 synthesizing effect Effects 0.000 claims 1
- 230000008569 process Effects 0.000 description 13
- 238000004891 communication Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 241000282376 Panthera tigris Species 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000003786 synthesis reaction Methods 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000002567 autonomic effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013481 data capture Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1453—Management of the data involved in backup or backup restore using de-duplication of the data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- H04L29/08—
-
- H04L29/14—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1456—Hardware arrangements for backup
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/815—Virtual
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/84—Using snapshots, i.e. a logical point-in-time copy of the data
Definitions
- This application relates generally to data storage, and more specifically to a system, article of manufacture and method for cloud-based data and/or applications recovery.
- a remote, online, or managed backup service is a service that provides users with a system for the backup, storage, and recovery of computer files. Additionally, many services are also hosted in remote cloud systems. Online backup providers and hosts can provide these type of service to customers (e.g. end users, clients). Online backup providers can maintain and manage physical servers host a variety of applications like virtual machines (VM's), Microsoft Exchange Servers, Microsoft (MS) SQL servers, file servers etc. Customers have come to expect continuous application uptime. However, physical disasters can take a remote online service offline. For example, Disaster may not be confined to a physical server but the entire site hosting the physical servers may go down. Consequently, customers cannot access the applications/data if the physical servers meet with a disaster. The longer the application downtime, the larger the impact to the users/business. Accordingly, improvements in these services can enable online backup providers to provide various forms of continuous back up protection and/or restoration.
- a computer-implemented method includes the step of communicatively coupling with an application-server local area network (LAN).
- the physical servers are discovered in the application-server LAN.
- the applications running in one or more physical servers in the application-server LAN are discovered.
- the application data and the application metadata are captured.
- the application data and the application metadata are parsed.
- the unique data blocks of the application data and the application metadata are identified.
- the unique data blocks are uploaded to a cloud-computing platform. It is determined that the one or more physical servers running the application data and the application metadata is no longer available in the application-server LAN.
- a cloud-based appliance in the cloud-computing platform is placed in an operational state.
- An application associated with the application data and the application metadata is identified.
- An instruction is received from a user, wherein the instruction comprises a selection of the application associated with the application data and the application metadata.
- the unique data blocks of the application data and the application metadata stored in the cloud-based platform are downloaded from cloud storage.
- the application data and the application metadata are reformatted into a native format supported by the cloud-based platform.
- a cloud-based appliance is associated with the application data and the application metadata is provided, wherein the cloud-based appliance, and wherein the cloud-based application manages an implementation of a cloud-based version of the application.
- FIGS. 1A-B illustrate an example method for cloud-based data and/or application recovery, according to some embodiments.
- FIG. 2 illustrates another example system of cloud-based data and/or application recovery with an NTFS system, according to some embodiments.
- FIG. 3 illustrates an example system of Microsoft Azure® blob storage, according to some embodiments.
- FIG. 4 depicts computing system with a number of components that may be used to perform any of the processes described herein.
- the schematic flow chart diagrams included herein are generally set forth as logical flow chart diagrams. As such, the depicted order and labeled steps are indicative of one embodiment of the presented method. Other steps and methods may be conceived that are equivalent in function, logic, or effect to one or more steps, or portions thereof, of the illustrated method. Additionally, the format and symbols employed are provided to explain the logical steps of the method and are understood not to limit the scope of the method. Although various arrow types and line types may be employed in the flow chart diagrams, and they are understood not to limit the scope of the corresponding method. Indeed, some arrows or other connectors may be used to indicate only the logical flow of the method. For instance, an arrow may indicate a waiting or monitoring period of unspecified duration between enumerated steps of the depicted method. Additionally, the order in which a particular method occurs may or may not strictly adhere to the order of the corresponding steps shown.
- Application server can be, inter alia, a software framework that provides a generalized approach to creating an application-server implementation, regard to what the application functions are and/or the server portion of a specific implementation instance.
- the server's function can be dedicated to the execution of procedures (e.g. programs, routines, scripts) for supporting its applied applications.
- An application server can be an example of a physical server.
- Azure® (Microsoft Azure) can be a cloud computing platform and infrastructure, created by Microsoft, for building, deploying and managing applications and/or services through a global network of datacenters. It provides both PaaS and IaaS services and/or supports various different programming languages, tools and/or frameworks (e.g. Microsoft-specific and/or third-party software and systems).
- a backup or the process of backing up, can refer to the copying and/or archiving of computer data so it may be used to restore the original after a data loss event.
- Chunk can be the segments of data that are generated from a data stream by splitting the data stream at fixed or variable lengths.
- a chunk can be a specified fixed size or variable size.
- Cloud computing can be computing that can involve a large number of computers connected through a communication network such as the Internet. Cloud computing can be a form of distributed computing over a network, and can include the ability to run a program or application on many connected computers at the same time.
- Cloud storage can be a model of networked enterprise storage where data is stored in virtualized pools of storage which are generally hosted by third parties.
- Hosting companies can operate large data centers, and users can have data hosted by leasing storage capacity from said hosting companies. Physically, the resource can span across multiple servers and multiple locations.
- Continuous data protection can be backup of computer data by automatically saving a copy of every change made to that data. It allows the user or administrator to restore data to any point in time.
- Elasticity can be the degree to which a cloud-computing system is able to adapt to workload changes by provisioning and deprovisioning resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible.
- Hyper-V can be a native hypervisor that enables platform virtualization on x86-64 systems.
- IaaS Infrastructure as a service
- cloud-service model can be physical machines, virtual machines, and/or other resources offered with a cloud-service model.
- Local area network can be a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building using network media.
- MD5 message-digest algorithm hashing algorithm can cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number.
- New Technology File System is a proprietary file system developed by Microsoft.
- PaaS Platform as a service
- PaaS Platform as a service
- Software application can be a group of software programs that execute the workflows related to backup and disaster recovery.
- TIGER hashing algorithm can be a cryptographic hash function.
- Virtual machine can be a software-based emulation of a computer. Virtual machines can operate based on the computer architecture and functions of a computer.
- an application running on a physical server can be restored on cloud computing platform (e.g. a collection of remote computing service) when it is detected that the physical server is no longer available.
- An appliance can be co-located with the physical server to capture the application data and/or metadata. The data and/or metadata can be replicated to the appliance in a cloud computing platform that uses this information to perform disaster recovery.
- FIGS. 1 A-B illustrate an example method 100 for cloud-based data and/or application recovery, according to some embodiments.
- an appliance module can be ‘plugged into’ an application server's LAN.
- the appliance module can be co-located with the physical server.
- the appliance module can capture the application data and/or metadata.
- the appliance module can include pre-installed software application.
- the appliance can be configured to work with a user-selected cloud vendor (e.g. Google Cloud®, Appistry's CloudIQ®, Amazon Web Services®, gCloud3 gPlatform®, Microsoft Azure®, etc.).
- a user-selected cloud vendor e.g. Google Cloud®, Appistry's CloudIQ®, Amazon Web Services®, gCloud3 gPlatform®, Microsoft Azure®, etc.
- public clouds like Microsoft Azure, Amazon, etc. and/or private clouds (e.g.
- the application server can an example of a physical server.
- the appliance module discovers the physical servers and applications running thereon. For example, the appliance connects to the physical server using user provided credentials. After the connection is established, the appliance software can push a few executable programs to the physical system. These programs execute on the physical server and enumerate the different applications on it. This list is returned to the appliance.
- step 106 can capture application data and/or metadata.
- the appliance module can capture the metadata and/or data of these applications periodically as scheduled and/or on an on-demand basis as invoked by a user.
- the data can be captured from the snapshot.
- the snapshot can be created using a standard volume snapshot service (VSS) framework (e.g. a shadow copy service) that flushes the application data and/or creates a data consistent point-in-time copy.
- VSS volume snapshot service
- the data capture process can include two steps. The first step can involve the metadata of the application.
- the metadata can be backed up by querying the application interfaces and/or reading the known configuration parameters.
- the second step can involve the data backup.
- the data can be one or more files and/or data streams and/or raw disk streams.
- the appliance module can analyse the metadata and/or data using a pluggable deduplication engine.
- the deduplication engine can chunk a backup data stream.
- the deduplication engine can use a hashing algorithm to generate a hash for each chunk.—The hashing algorithm and/or chunk length can be specified for each deduplication engine.
- the deduplication engine is pluggable in a sense that there can be different types of engines plugged in at a given point in time.
- one deduplication engine can implement fixed size chunks and use MD5 message-digest algorithm hashing algorithm.
- Another deduplication engine have implement variable size chunks and use TIGER (e.g. a 912) hashing algorithm.
- the unique data blocks are uploaded to elastic storage on a cloud-based platform.
- Analysis can include the following.
- the deduplication engine can be configured during appliance installation. All backup streams can be chunked by this deduplication engine and/or hashes can be generated. Additionally, a map can be generated for each backup stream. The map can provide the sequential order of hashes needed to synthesize the backup stream. The hashes and/and the map can form the metadata. It is noted that the data can be in a chunked format.
- step 110 it can be determined if the physical server (e.g. the application server) is available (e.g. online, not subject to a disaster-related failure). If yes, then process 100 can return to an earlier step (e.g. 106 ). If no, then process 100 can proceed to step 112 .
- a cloud-based appliance module (not at the physical server location) can be placed in an operation state (e.g. available for performing application operations, providing stored backup data, etc.). For example, if the application and/or physical server and/or the server site meets with a disaster, a cloud-based appliance module at the cloud becomes operational.
- a user can log into the cloud-based appliance. The user can view and/or selects the application(s) to be recovered from cloud-computing platform.
- cloud-based appliance software can download the unique blocks for the selected applications from the cloud storage.
- the cloud-based appliance software synthesizes the application metadata and data from the unique blocks on the cloud elastic storage.
- the deduplication engine can ensures that the chunk is written once on the disk.
- the deduplication engine can ensure that the data is written once to the disk attached to the appliance in the form of chunks. These chunks can be uploaded to the cloud.
- the chunks in the cloud can be unique.
- For each backup stream/image there can be a map that has the sequence of hashes needed to synthesize the image. Along with the unique data chunks, the map can also be replicated to the elastic cloud-computing platform. To synthesize the backup stream/image on the cloud, the map can be accessed.
- the unique data chunks can be read and/or rearranged in a target file to be restored.
- the cloud-based appliance software can reformat the application metadata and/or data into a native format supported by the cloud-based platform infrastructure.
- the files are synthesized using the map and the unique data chunks.
- This input parameter can define the format in which the file has to be synthesized.
- the target platform formats can be open and known (e.g. VHD/VHDX for a HyperV system and/or VMDK for VMware system).
- the original file format of the file can be VMDK (i.e. VM on a VMware platform).
- the synthesis procedure can obtain the reformate parameter as VHD and synthesizes the file in VHD format.
- the data can be the same but it is formatted as VHD instead of VMDK.
- This file is pushed to Azure infrastructure and run as a VM in the cloud.
- the cloud-base appliance can restore the application to the cloud infrastructure and start the application.
- users can resume application access by connecting to a cloud-based version of the application running on the cloud-based platform.
- a user the unique data of user-configured applications can be selectively replicated to the elastic cloud-based platforms data storage.
- the cloud-based appliance can be online only when required (e.g. when the application server is not available due to a disaster). Selective download of unique chunks from elastic cloud-based storage can be used to synthesize the cloud-based application.
- a reformat application data can enable provisioning it to the cloud-based platform.
- FIG. 2 illustrates another example system 200 of cloud-based data and/or application recovery with an NTFS system, according to some embodiments.
- System 200 can include domain 202 .
- domain 202 can be a Windows® domain (e.g. a group of Windows-based computers).
- Domain 202 can include a set of physical servers and/or their applications, such as clients to be backed up 204 A-C.
- On-site appliance 206 can include pre-installed software that is plugged-in into the LAN of domain 202 .
- On-site appliance 206 can be configured to work with a user selected cloud vendor.
- On-site appliance 206 can discover the physical servers and applications clients 204 A-C.
- On-site appliance 206 can capture the metadata and/or data of these applications on either a scheduled periodic basis and/or demand based as invoked by the user. On-site appliance 206 can analyze this metadata and/or data using a pluggable deduplication engine. The unique data blocks can then be uploaded to elastic storage on cloud (e.g. Azure® blob storage 212 ) via computer networks 210 . The unique data blocks can be stored as unique de-duplicated chunks 214 in a storage vault of Azure® blob storage 212 .
- cloud e.g. Azure® blob storage 212
- FIG. 3 illustrates an example system 300 of Azure® cloud computing platform 312 , according to some embodiments.
- Unique de-duplicated chunks 214 can be in a storage vault of Azure® cloud computing platform 312 (e.g. can include Azure® blob storage 212 ).
- a process 304 of selective import from storage vault can be performed. The import can be to a version of the appliance implemented in the Azure® cloud computing platform 312 .
- a deployment process 300 can then be implemented to configure a virtual machine 302 restored in the Azure® cloud computing platform 312 .
- FIGS. 2 and 3 are provided by way of example and not of limitation.
- FIG. 4 depicts an exemplary computing system 400 that can be configured to perform any one of the processes provided herein.
- computing system 400 may include, for example, a processor, memory, storage, and I/O devices (e.g., monitor, keyboard, disk drive, Internet connection, etc.).
- computing system 400 may include circuitry or other specialized hardware for carrying out some or all aspects of the processes.
- computing system 400 may be configured as a system that includes one or more units, each of which is configured to carry out some aspects of the processes either in software, hardware, or some combination thereof.
- FIG. 4 depicts computing system 400 with a number of components that may be used to perform any of the processes described herein.
- the main system 402 includes a motherboard 404 having an I/O section 406 , one or more central processing units (CPU) 408 , and a memory section 410 , which may have a flash memory card 412 related to it.
- the I/O section 406 can be connected to a display 414 , a keyboard and/or other user input (not shown), a disk storage unit 416 , and a media drive unit 418 .
- the media drive unit 418 can read/write a computer-readable medium 420 , which can contain programs 422 and/or data.
- Computing system 400 can include a web browser.
- computing system 400 can be configured to include additional systems in order to fulfill various functionalities.
- Computing system 400 can communicate with other computing devices based on various computer communication protocols such a Wi-Fi, Bluetooth® (and/or other standards for exchanging data over short distances includes those using short-wavelength radio transmissions), USB, Ethernet, cellular, an ultrasonic local area communication protocol, etc.
- the cloud-appliance can be configured to regularly backup the recovered system running on the cloud. Accordingly, multiple images corresponding to the system running on the cloud can be captured and stored by the cloud appliance. The cloud-appliance can detect the unique data chunks of these backup images and uploads these chunks to the cloud storage. The cloud-appliance can integrate with the cloud infrastructure APIs to discover any other systems running in the cloud. The cloud-appliance can be configured to regularly backup these systems (e.g. are manually created in the cloud).
- the cloud-appliance can back up the system regularly.
- the system can upload unique chunks to cloud storage.
- the user can power-on another on-site appliance and configure it to regularly download new unique data chunks from the cloud storage.
- the on-site appliance can restore this image.
- the various operations, processes, and methods disclosed herein can be embodied in a machine-readable medium and/or a machine accessible medium compatible with a data processing system (e.g., a computer system), and can be performed in any order (e.g., including using means for achieving the various operations). Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
- the machine-readable medium can be a non-transitory form of machine-readable medium.
Abstract
Description
Claims (15)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/280,686 US9558076B2 (en) | 2014-05-19 | 2014-05-19 | Methods and systems of cloud-based disaster recovery |
US14/335,295 US9760447B2 (en) | 2014-05-19 | 2014-07-18 | One-click backup in a cloud-based disaster recovery system |
US14/335,243 US20160210198A1 (en) | 2014-05-19 | 2014-07-18 | One-click backup in a cloud-based disaster recovery system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/280,686 US9558076B2 (en) | 2014-05-19 | 2014-05-19 | Methods and systems of cloud-based disaster recovery |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/335,295 Continuation-In-Part US9760447B2 (en) | 2014-05-19 | 2014-07-18 | One-click backup in a cloud-based disaster recovery system |
US14/335,243 Continuation-In-Part US20160210198A1 (en) | 2014-05-19 | 2014-07-18 | One-click backup in a cloud-based disaster recovery system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150331758A1 US20150331758A1 (en) | 2015-11-19 |
US9558076B2 true US9558076B2 (en) | 2017-01-31 |
Family
ID=54538599
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/280,686 Active - Reinstated 2035-02-21 US9558076B2 (en) | 2014-05-19 | 2014-05-19 | Methods and systems of cloud-based disaster recovery |
Country Status (1)
Country | Link |
---|---|
US (1) | US9558076B2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10887382B2 (en) | 2018-12-18 | 2021-01-05 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
WO2020131484A3 (en) * | 2018-12-18 | 2021-03-04 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
WO2020131486A3 (en) * | 2018-12-18 | 2021-03-04 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
WO2020131483A3 (en) * | 2018-12-18 | 2021-03-04 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
US11327846B2 (en) | 2017-09-28 | 2022-05-10 | Oracle International Corporation | System and method for backup and recovery of services in a cloud computing environment |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9501361B2 (en) * | 2014-09-26 | 2016-11-22 | Silverstring Ltd. | Disaster recovery system |
US10956270B2 (en) * | 2016-03-30 | 2021-03-23 | Acronis International Gmbh | System and method for data protection during full data backup |
US11223536B2 (en) | 2016-04-04 | 2022-01-11 | At&T Intellectual Property I, L.P. | Model driven process for automated deployment of domain 2.0 virtualized services and applications on cloud infrastructure |
CN106354584A (en) * | 2016-08-30 | 2017-01-25 | 北京中科同向信息技术有限公司 | Technique based on cloud backup for disaster recovery |
US10496838B1 (en) * | 2017-10-06 | 2019-12-03 | EMC IP Holding Company LLC | Security protection for virtual machine backups |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020120763A1 (en) * | 2001-01-11 | 2002-08-29 | Z-Force Communications, Inc. | File switch and switched file system |
US20030177411A1 (en) * | 2002-03-12 | 2003-09-18 | Darpan Dinker | System and method for enabling failover for an application server cluster |
US20040047354A1 (en) * | 2002-06-07 | 2004-03-11 | Slater Alastair Michael | Method of maintaining availability of requested network resources, method of data storage management, method of data storage management in a network, network of resource servers, network, resource management server, content management server, network of video servers, video server, software for controlling the distribution of network resources |
US20110167221A1 (en) * | 2010-01-06 | 2011-07-07 | Gururaj Pangal | System and method for efficiently creating off-site data volume back-ups |
US8244914B1 (en) * | 2009-07-31 | 2012-08-14 | Symantec Corporation | Systems and methods for restoring email databases |
-
2014
- 2014-05-19 US US14/280,686 patent/US9558076B2/en active Active - Reinstated
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020120763A1 (en) * | 2001-01-11 | 2002-08-29 | Z-Force Communications, Inc. | File switch and switched file system |
US7562110B2 (en) * | 2001-01-11 | 2009-07-14 | F5 Networks, Inc. | File switch and switched file system |
US20030177411A1 (en) * | 2002-03-12 | 2003-09-18 | Darpan Dinker | System and method for enabling failover for an application server cluster |
US6944788B2 (en) * | 2002-03-12 | 2005-09-13 | Sun Microsystems, Inc. | System and method for enabling failover for an application server cluster |
US20040047354A1 (en) * | 2002-06-07 | 2004-03-11 | Slater Alastair Michael | Method of maintaining availability of requested network resources, method of data storage management, method of data storage management in a network, network of resource servers, network, resource management server, content management server, network of video servers, video server, software for controlling the distribution of network resources |
US8244914B1 (en) * | 2009-07-31 | 2012-08-14 | Symantec Corporation | Systems and methods for restoring email databases |
US20110167221A1 (en) * | 2010-01-06 | 2011-07-07 | Gururaj Pangal | System and method for efficiently creating off-site data volume back-ups |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11327846B2 (en) | 2017-09-28 | 2022-05-10 | Oracle International Corporation | System and method for backup and recovery of services in a cloud computing environment |
US10887382B2 (en) | 2018-12-18 | 2021-01-05 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
WO2020131485A3 (en) * | 2018-12-18 | 2021-03-04 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
WO2020131484A3 (en) * | 2018-12-18 | 2021-03-04 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
WO2020131486A3 (en) * | 2018-12-18 | 2021-03-04 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
WO2020131483A3 (en) * | 2018-12-18 | 2021-03-04 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
US10983886B2 (en) | 2018-12-18 | 2021-04-20 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
US11178221B2 (en) | 2018-12-18 | 2021-11-16 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
US11252019B2 (en) | 2018-12-18 | 2022-02-15 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
Also Published As
Publication number | Publication date |
---|---|
US20150331758A1 (en) | 2015-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9558076B2 (en) | Methods and systems of cloud-based disaster recovery | |
US9760447B2 (en) | One-click backup in a cloud-based disaster recovery system | |
US11924034B2 (en) | Migration of an existing computing system to new hardware | |
US11611479B2 (en) | Migration of existing computing systems to cloud computing sites or virtual machines | |
US20170235649A1 (en) | Container aware networked data layer | |
US9451023B2 (en) | Information management of virtual machines having mapped storage devices | |
US11321348B2 (en) | Provisioning and managing replicated data instances | |
DK3008600T3 (en) | Backup of a virtual machine from a storage snapshot | |
US11086662B2 (en) | Method and system of migrating applications to a cloud-computing environment | |
EP3474138B1 (en) | Item-level restoration and verification of image level backups | |
AU2014374256B2 (en) | Systems and methods for improving snapshot performance | |
US10013491B2 (en) | Methods and systems of workload mobility across divergent platforms | |
US20140149696A1 (en) | Virtual machine backup using snapshots and current configuration | |
US20160210198A1 (en) | One-click backup in a cloud-based disaster recovery system | |
US10514988B2 (en) | Method and system of migrating applications to a cloud-computing environment | |
US10824516B2 (en) | Method and system of universal server migration | |
Faltin | Capturing images and storing on the server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: MICROENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: MICROENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20210131 |
|
PRDP | Patent reinstated due to the acceptance of a late maintenance fee |
Effective date: 20210427 |
|
FEPP | Fee payment procedure |
Free format text: SURCHARGE, PETITION TO ACCEPT PYMT AFTER EXP, UNINTENTIONAL. (ORIGINAL EVENT CODE: M2558); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: PETITION RELATED TO MAINTENANCE FEES GRANTED (ORIGINAL EVENT CODE: PMFG); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: PETITION RELATED TO MAINTENANCE FEES FILED (ORIGINAL EVENT CODE: PMFP); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: SURELINE SYSTEMS INC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DURGE, SACHIN BABAN;NAGARKAR, KULDEEP SURESHRAO;GOYAL, RAVENDER;AND OTHERS;REEL/FRAME:056579/0965 Effective date: 20210513 |
|
AS | Assignment |
Owner name: PERSISTENT SYSTEMS INC.,, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SURELINE SYSTEMS, INC.;REEL/FRAME:057850/0139 Effective date: 20210519 |
|
AS | Assignment |
Owner name: HSBC BANK USA, NATIONAL ASSOCIATION, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:PERSISTENT SYSTEMS INC.;SOFTWARE COMPANY INTERNATIONAL, LLC;REEL/FRAME:058095/0958 Effective date: 20211022 |
|
AS | Assignment |
Owner name: HSBC BANK USA, NATIONAL ASSOCIATION, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:PERSISTENT SYSTEMS INC.;REEL/FRAME:059132/0355 Effective date: 20220228 |
|
AS | Assignment |
Owner name: HSBC BANK USA, NATIONAL ASSOCIATION, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:PERSISTENT SYSTEMS INC.;SOFTWARE COMPANY INTERNATIONAL, LLC, AS SUCCESSOR-BY-CONVERSION TO SOFTWARE CORPORATION INTERNATIONAL;REEL/FRAME:060218/0077 Effective date: 20220503 Owner name: HSBC BANK USA, NATIONAL ASSOCIATION, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:PERSISTENT SYSTEMS INC.;REEL/FRAME:060218/0123 Effective date: 20220503 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |